Vulnerability Note VU#385908
Clam AntiVirus vulnerable to memory corruption via specially crafted UPX packed file
A vulnerability in the ClamAV antivirus toolkit may allow a remote attacker to execute arbitrary code on a vulnerable system.
Clam AntiVirus is an antivirus toolkit for Unix-like systems that is commonly integrated with mail servers for email attachment scanning. It supports a number of different file formats, including the Ultimate Packer for eXecutables (UPX).
A remote unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. The attacker-supplied code would be executed with the privileges of the running ClamAV process.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Gentoo Linux||Affected||-||16 Jan 2006|
|Trustix Secure Linux||Affected||-||16 Jan 2006|
CVSS Metrics (Learn More)
Thanks to ClamAV for reporting this vulnerability.
This document was written by Chad R Dougherty.
- CVE IDs: CVE-2006-0162
- Date Public: 09 Jan 2006
- Date First Published: 16 Jan 2006
- Date Last Updated: 16 Jan 2006
- Severity Metric: 26.72
- Document Revision: 9
If you have feedback, comments, or additional information about this vulnerability, please send us email.